SlideShare a Scribd company logo
1 of 15
Download to read offline
Terminology Matching of
Requirements Specification
Documents and Regulations
for Compliance Checking
Tokyo Institute of Technology, Japan
Ryotaro Nakamura,Yu Negishi,
Shinpei Hayashi, and Motoshi Saeki
1
2
Goal: Regulation-Compliant
Requirements Elicitation
 Many regulations, laws, rules, etc. to follow
 How to obtain requirements compliant to
regulations?
☞Verification &Validation to check compliance
after/during eliciting requirements
3
Our Approach:
Systematic Checking
 Formal and iterative ways to improve
compliance!
Requirements
Specification
Regulation
Regulation
Regulation
Regulation
Systematic check
of compliance
Feedback
Compliance Checking
w/ Model Checker [Saeki 09]
4
RegulationRegulationRegulation
Regulation
Compliance checking using
Model Checker
Feedback
Actor
UC1
S1 S2
State transition diag.
Use case desc.
Logical formula
Requirements Specification
p → AF q
Regulation
[Act on the Protection of Personal Information]
Use case description
Terminology Matching
5
...
3. The system gets from
a customer her address.
...
6. The system notifies the
purpose of utilization
to the customer.
When having acquired personal
information, a business operator
handling personal information
shall, ..., promptly notify the
person of the Purpose of
Utilization or publicly announce
the Purpose of Utilization.
How to associate these sentences?
Regulation
[Act on the Protection of Personal Information]Use case description
6
Case Grammar Approach
 Requires semantic relationship of words
6
3. The system gets from
a customer her address
When having acquired personal
information, a business operator
handling personal information shall, ...
(Get,
actor: System,
object: Address,
source: Customer)
(Acquire,
actor: Business operator,
object: Personal information,
source: Person)
Dictionaries
Overview of OurTechnique
7
State transition
model
Use case
desc.
Case frames
w/ concepts
Sentences
in case
frame form
Properties
concept
hierarchy
: :
Case
frames
Regulations
Detecting
concepts
Generating
props.
Words
Model
checker
1st step 2nd step
Checking
consistency
Step 1: Detecting Concepts
8
verb actor object source
Learn Human |
Organization
Habit |
Studies
Human |
Organization
verb actor object source
Acquire Human |
Organization
Thing Human |
Organization
Dictionary of Case Frames
“The system gets from the
customer her address”
Case Structure
verb actor object source
Get System Address Customer
P
System Address Customer
Customer
HumanThing
Address
Dictionary of
Hierarchical Concepts
Get
Acquire
Learn
Term
Personal
information Person
✘
✔
Institution
Organization
Business
operator
Step 2: Instantiating
PropertyTemplate
9
(Acquire, ...)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
verb actor object source
Get System Address Customer
Case frame from RD
Template
Instantiate every
possible candidates
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...)
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
(Get, System,Address, Customer)
∧ ¬ (Announce, ...)
→ AF ((Notify, ...) ∨ (Announce, ...))
10
Implementation
 Components
– Cabocha (Japanese lexical and dep. analyzer)
– NuSMV (Model checker)
– Dictionary: EDR Japanese dictionary
# words # concepts # frames
From EDR dic. 270000 410000 13000
Newly added by us 61 59 10
11
Case Studies and Acts
 Case 1: Online shopping (like Amazon)
– Act on Protection of Personal Information
• Article 18
– Act on Regulation of Transmission of Specified
Electronic Mail
• Article 3
– Act on Specified Commercial Transactions
• Articles 11 and 13
 Case 2: Pet Store
– Act on Welfare and Management of Animals
• Articles 21 and 22
12
Case 1: Online Shopping
 Including 16 use cases
Show Change password
Send an ad-mail
Reject receiving
ad-mails
Confirm privacy
policy
Remove an item
from the cart
Open the items
of the cart
<<include>>
Sign up
Customer Admin
Log out
Delete account
Display the
detail of an item
Add an item to
the cart
<<include>>
Open search
page
<<include>>
<<include>>
Log in
<<include>>
Check out
Accept receiving
ad-mails
<<include>>
Open account
setting page
13
Case 1: Results
 Precision: 0.50 (4/8)
 Recall: 0.66 (4/6)
 Reason of failures:
– Structural differences of case frames
• “System receives payment” vs.“System approves payment”
– Regardless of relationships between formulas
14
Case 2: Pet Store
 Confirmed violation by comparing the results
– Operator shall show a buyer the cats/dogs that she
likes to by directly in advance
Reserve an appointment
to see cats/dogs
Register
animals
Show
cats/dogs
suggested to add
15
Concluding Remarks
 Conclusion
– A technique to support matching the words in a RD
and regulations for checking the consistency
– Word matching based on the concept hierarchy
– Confirmed the feasibility
 Future work
– Improving accuracy of matching
– Larger case studies

More Related Content

Viewers also liked

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionShinpei Hayashi
 
Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Shinpei Hayashi
 
Guiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationGuiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationShinpei Hayashi
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisHiroshi Kazato
 
Visualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapVisualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapTakanori Ugai
 
Toward Structured Location of Features
Toward Structured Location of FeaturesToward Structured Location of Features
Toward Structured Location of FeaturesHiroshi Kazato
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source CodeShinpei Hayashi
 
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Shinpei Hayashi
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchShinpei Hayashi
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeHiroshi Kazato
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History RefactoringShinpei Hayashi
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」Takashi Kobayashi
 

Viewers also liked (12)

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
 
Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...Toward Understanding How Developers Recognize Features in Source Code from De...
Toward Understanding How Developers Recognize Features in Source Code from De...
 
Guiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature LocationGuiding Identification of Missing Scenarios for Dynamic Feature Location
Guiding Identification of Missing Scenarios for Dynamic Feature Location
 
Feature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept AnalysisFeature Location for Multi-Layer System Based on Formal Concept Analysis
Feature Location for Multi-Layer System Based on Formal Concept Analysis
 
Visualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored MapVisualizing Stakeholder Concerns with Anchored Map
Visualizing Stakeholder Concerns with Anchored Map
 
Toward Structured Location of Features
Toward Structured Location of FeaturesToward Structured Location of Features
Toward Structured Location of Features
 
Refactoring Edit History of Source Code
Refactoring Edit History of Source CodeRefactoring Edit History of Source Code
Refactoring Edit History of Source Code
 
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...Supporting Design Model Refactoring for Improving Class Responsibility Assign...
Supporting Design Model Refactoring for Improving Class Responsibility Assign...
 
Detecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic SearchDetecting Occurrences of Refactoring with Heuristic Search
Detecting Occurrences of Refactoring with Heuristic Search
 
Incremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source CodeIncremental Feature Location and Identification in Source Code
Incremental Feature Location and Identification in Source Code
 
Historef: A Tool for Edit History Refactoring
Historef: A Tool  for Edit History RefactoringHistoref: A Tool  for Edit History Refactoring
Historef: A Tool for Edit History Refactoring
 
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
FOSE2010 ミニチュートリアル 「データマイニング技術を応用したソフトウェア構築・保守支援」
 

Similar to Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking

Automated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsAutomated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsLionel Briand
 
Real Time Business Insights
Real Time Business Insights Real Time Business Insights
Real Time Business Insights Jaiveer Singh
 
The 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasThe 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasTracy Clark
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalSmita S. Ghaisas
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data MiningNofel Elahi
 
Supply Chain Basic terminologies
Supply Chain Basic terminologiesSupply Chain Basic terminologies
Supply Chain Basic terminologiesWaqar Ahmed Khan
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepmSayanChaudhuri5
 
Thesis Statement Examples For Research Papers Ess
Thesis Statement Examples For Research Papers  EssThesis Statement Examples For Research Papers  Ess
Thesis Statement Examples For Research Papers EssCynthia Wilson
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay OutlinesAndrea Ngo
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay OutlinesCindy Turner
 
Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Michelle Madero
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydneyanthonywong
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...Knobbe Martens - Intellectual Property Law
 
Student Persuasive Essay Topics
Student Persuasive Essay TopicsStudent Persuasive Essay Topics
Student Persuasive Essay TopicsJessica Gefroh
 
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)Alex G. Lee, Ph.D. Esq. CLP
 
Refining The System Definition
Refining The System DefinitionRefining The System Definition
Refining The System DefinitionSandeep Ganji
 
Cyber Security Unit laws_and_regulatory_requirements.pptx
Cyber Security Unit  laws_and_regulatory_requirements.pptxCyber Security Unit  laws_and_regulatory_requirements.pptx
Cyber Security Unit laws_and_regulatory_requirements.pptxSourabhNath4
 
Use cases - As approach to building shared vision
Use cases - As approach to building shared visionUse cases - As approach to building shared vision
Use cases - As approach to building shared visionAbhilash Gopalakrishnan
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxdewhirstichabod
 

Similar to Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking (20)

Automated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal RequirementsAutomated Recommendation of Templates for Legal Requirements
Automated Recommendation of Templates for Legal Requirements
 
Real Time Business Insights
Real Time Business Insights Real Time Business Insights
Real Time Business Insights
 
The 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example IdeasThe 25 Best Opinion Paragraph Example Ideas
The 25 Best Opinion Paragraph Example Ideas
 
Business analysis thinking methodology
Business analysis thinking methodologyBusiness analysis thinking methodology
Business analysis thinking methodology
 
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_finalTowards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
Towards Automating Security Compliance Value Chain_FSE15_2June_submitted_final
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data Mining
 
Supply Chain Basic terminologies
Supply Chain Basic terminologiesSupply Chain Basic terminologies
Supply Chain Basic terminologies
 
V labs-assignment-1-sepm
V labs-assignment-1-sepmV labs-assignment-1-sepm
V labs-assignment-1-sepm
 
Thesis Statement Examples For Research Papers Ess
Thesis Statement Examples For Research Papers  EssThesis Statement Examples For Research Papers  Ess
Thesis Statement Examples For Research Papers Ess
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay Outlines
 
A Level Gp Essay Outlines
A Level Gp Essay OutlinesA Level Gp Essay Outlines
A Level Gp Essay Outlines
 
Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )Transaction Processing Systems ( Tps )
Transaction Processing Systems ( Tps )
 
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 SydneyLegal Framework for Cloud Computing Cebit May 31 2011 Sydney
Legal Framework for Cloud Computing Cebit May 31 2011 Sydney
 
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ... Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
Knobbe Practice Webinar Series: Strategic Considerations for Claim Drafting ...
 
Student Persuasive Essay Topics
Student Persuasive Essay TopicsStudent Persuasive Essay Topics
Student Persuasive Essay Topics
 
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)IoT Business Implications of Joint Infringement (Akamai v. Limelight)
IoT Business Implications of Joint Infringement (Akamai v. Limelight)
 
Refining The System Definition
Refining The System DefinitionRefining The System Definition
Refining The System Definition
 
Cyber Security Unit laws_and_regulatory_requirements.pptx
Cyber Security Unit  laws_and_regulatory_requirements.pptxCyber Security Unit  laws_and_regulatory_requirements.pptx
Cyber Security Unit laws_and_regulatory_requirements.pptx
 
Use cases - As approach to building shared vision
Use cases - As approach to building shared visionUse cases - As approach to building shared vision
Use cases - As approach to building shared vision
 
Businesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docxBusinesses involved in mergers and acquisitions must exercise due di.docx
Businesses involved in mergers and acquisitions must exercise due di.docx
 

More from Shinpei Hayashi

Revisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationRevisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationShinpei Hayashi
 
An Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationAn Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationShinpei Hayashi
 
RefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringRefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringShinpei Hayashi
 
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Shinpei Hayashi
 
The Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingThe Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingShinpei Hayashi
 
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeShinpei Hayashi
 
Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Shinpei Hayashi
 
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisDetecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisShinpei Hayashi
 
ソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いShinpei Hayashi
 

More from Shinpei Hayashi (9)

Revisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change RecommendationRevisiting the Effect of Branch Handling Strategies on Change Recommendation
Revisiting the Effect of Branch Handling Strategies on Change Recommendation
 
An Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug LocalizationAn Extensive Study on Smell Aware Bug Localization
An Extensive Study on Smell Aware Bug Localization
 
RefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for RefactoringRefactorHub: A Commit Annotator for Refactoring
RefactorHub: A Commit Annotator for Refactoring
 
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
Can Automated Impact Analysis Technique Help Predicting Decaying Modules?
 
The Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History SlicingThe Impact of Systematic Edits in History Slicing
The Impact of Systematic Edits in History Slicing
 
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source CodeChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
ChangeMacroRecorder: Recording Fine-Grained Textual Changes of Source Code
 
Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2Inference-Based Detection of Architectural Violations in MVC2
Inference-Based Detection of Architectural Violations in MVC2
 
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements AnalysisDetecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
Detecting Bad Smells of Refinement in Goal-Oriented Requirements Analysis
 
ソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘いソフトウェア工学勉強会への誘い
ソフトウェア工学勉強会への誘い
 

Recently uploaded

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Recently uploaded (20)

Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking

  • 1. Terminology Matching of Requirements Specification Documents and Regulations for Compliance Checking Tokyo Institute of Technology, Japan Ryotaro Nakamura,Yu Negishi, Shinpei Hayashi, and Motoshi Saeki 1
  • 2. 2 Goal: Regulation-Compliant Requirements Elicitation  Many regulations, laws, rules, etc. to follow  How to obtain requirements compliant to regulations? ☞Verification &Validation to check compliance after/during eliciting requirements
  • 3. 3 Our Approach: Systematic Checking  Formal and iterative ways to improve compliance! Requirements Specification Regulation Regulation Regulation Regulation Systematic check of compliance Feedback
  • 4. Compliance Checking w/ Model Checker [Saeki 09] 4 RegulationRegulationRegulation Regulation Compliance checking using Model Checker Feedback Actor UC1 S1 S2 State transition diag. Use case desc. Logical formula Requirements Specification p → AF q
  • 5. Regulation [Act on the Protection of Personal Information] Use case description Terminology Matching 5 ... 3. The system gets from a customer her address. ... 6. The system notifies the purpose of utilization to the customer. When having acquired personal information, a business operator handling personal information shall, ..., promptly notify the person of the Purpose of Utilization or publicly announce the Purpose of Utilization. How to associate these sentences?
  • 6. Regulation [Act on the Protection of Personal Information]Use case description 6 Case Grammar Approach  Requires semantic relationship of words 6 3. The system gets from a customer her address When having acquired personal information, a business operator handling personal information shall, ... (Get, actor: System, object: Address, source: Customer) (Acquire, actor: Business operator, object: Personal information, source: Person)
  • 7. Dictionaries Overview of OurTechnique 7 State transition model Use case desc. Case frames w/ concepts Sentences in case frame form Properties concept hierarchy : : Case frames Regulations Detecting concepts Generating props. Words Model checker 1st step 2nd step Checking consistency
  • 8. Step 1: Detecting Concepts 8 verb actor object source Learn Human | Organization Habit | Studies Human | Organization verb actor object source Acquire Human | Organization Thing Human | Organization Dictionary of Case Frames “The system gets from the customer her address” Case Structure verb actor object source Get System Address Customer P System Address Customer Customer HumanThing Address Dictionary of Hierarchical Concepts Get Acquire Learn Term Personal information Person ✘ ✔ Institution Organization Business operator
  • 9. Step 2: Instantiating PropertyTemplate 9 (Acquire, ...) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...)) verb actor object source Get System Address Customer Case frame from RD Template Instantiate every possible candidates (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...) (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...)) (Get, System,Address, Customer) ∧ ¬ (Announce, ...) → AF ((Notify, ...) ∨ (Announce, ...))
  • 10. 10 Implementation  Components – Cabocha (Japanese lexical and dep. analyzer) – NuSMV (Model checker) – Dictionary: EDR Japanese dictionary # words # concepts # frames From EDR dic. 270000 410000 13000 Newly added by us 61 59 10
  • 11. 11 Case Studies and Acts  Case 1: Online shopping (like Amazon) – Act on Protection of Personal Information • Article 18 – Act on Regulation of Transmission of Specified Electronic Mail • Article 3 – Act on Specified Commercial Transactions • Articles 11 and 13  Case 2: Pet Store – Act on Welfare and Management of Animals • Articles 21 and 22
  • 12. 12 Case 1: Online Shopping  Including 16 use cases Show Change password Send an ad-mail Reject receiving ad-mails Confirm privacy policy Remove an item from the cart Open the items of the cart <<include>> Sign up Customer Admin Log out Delete account Display the detail of an item Add an item to the cart <<include>> Open search page <<include>> <<include>> Log in <<include>> Check out Accept receiving ad-mails <<include>> Open account setting page
  • 13. 13 Case 1: Results  Precision: 0.50 (4/8)  Recall: 0.66 (4/6)  Reason of failures: – Structural differences of case frames • “System receives payment” vs.“System approves payment” – Regardless of relationships between formulas
  • 14. 14 Case 2: Pet Store  Confirmed violation by comparing the results – Operator shall show a buyer the cats/dogs that she likes to by directly in advance Reserve an appointment to see cats/dogs Register animals Show cats/dogs suggested to add
  • 15. 15 Concluding Remarks  Conclusion – A technique to support matching the words in a RD and regulations for checking the consistency – Word matching based on the concept hierarchy – Confirmed the feasibility  Future work – Improving accuracy of matching – Larger case studies